First published: Wed Jun 07 2023(Updated: )
On Triangle MicroWorks' SCADA Data Gateway version <= v5.01.03, an unauthenticated attacker can send a specially crafted broadcast message including format string characters to the SCADA Data Gateway to perform unrestricted memory reads.An unauthenticated user can use this format string vulnerability to repeatedly crash the GTWWebMonitor.exe process to DoS the Web Monitor. Furthermore, an authenticated user can leverage this vulnerability to leak memory from the GTWWebMonitor.exe process. This could be leveraged in an exploit chain to gain code execution.
Credit: trellixpsirt@trellix.com
Affected Software | Affected Version | How to fix |
---|---|---|
Trianglemicroworks Scada Data Gateway | <=5.01.03 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-2186 is rated as critical with a CVSS score of 9.8.
An unauthenticated attacker can exploit CVE-2023-2186 by sending a specially crafted broadcast message with format string characters to the SCADA Data Gateway.
CVE-2023-2186 affects Triangle MicroWorks SCADA Data Gateway version up to and including v5.01.03.